Sciweavers

24188 search results - page 127 / 4838
» Computing on Encrypted Data
Sort
View
USS
2008
15 years 5 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
125
Voted
CCS
2008
ACM
15 years 5 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
121
Voted
MAGS
2006
79views more  MAGS 2006»
15 years 2 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
JCM
2007
76views more  JCM 2007»
15 years 2 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...
HIPC
2005
Springer
15 years 8 months ago
Data and Computation Abstractions for Dynamic and Irregular Computations
Sriram Krishnamoorthy, Jarek Nieplocha, P. Sadayap...